Veröffentlichungen

Intervenierbarkeit zum Schutz informationeller Selbstbestimmung

2018 - Martin Degeling, Thomas Herrmann

In "Die Fortentwicklung des Datenschutzes: Zwischen Systemgestaltung und Selbstregulierung", edited by Alexander Roßnagel, Michael Friedewald, and Marit Hansen, 193–208. DuD-Fachbeiträge. Wiesbaden: Springer Fachmedien Wiesbaden. [Springer.com] [DOI]

Googles Interessenprofiling

2017 - Martin Degeling

in "Profile: Interdisziplinäre Beiträge"

On Locational Privacy in the Absence of Anonymous Payments

2015 - Tilman Frosch, Sven Schäge, Martin Goll, Thorsten Holz

Gutwirth, S., Leenes R., P. De Hert and Y. Poullet, Data protection on the Move. Current Developments in ICT and Privacy/Data Protection. Springer (forthcoming, 2015), Dordrecht. [pdf]

Security and Privacy as Hygiene Factors of Developer Behavior in Small and Agile Teams

2014 - Kai-Uwe Loser, Martin Degeling

In ICT and Society, edited by Kai Kimppa, Diane Whitehouse, Tiina Kuusela, and Jackie Phahlamohlaka, 255–65. IFIP Advances in Information and Communication Technology 431. Springer Berlin Heidelberg. [doi]

Scriptless attacks: Stealing more pie without touching the sill

2014 - Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk

Journal of Computer Security, Volume 22, Number 4 / 2014, Web Application Security – Web @ 25 [URL]

Profiling, Prediction und Privatheit: Über das Verhältnis eines liberalen Privatheitbegriffs zu neueren Techniken der Verhaltensvorhersage

2014 - Martin Degeling

In Medien und Privatheit, edited by Simon Garnett, Stefan Halft, Matthias Herz, and Julia Maria Mönig, 69–92. Medien, Texte, Semiotik 7. Passau: Verlag Karl Stutz. [pdf]

Predentifier: Detecting Botnet C&C Domains From Passive DNS Data

2013 - Tilman Frosch, Marc Kührer, Thorsten Holz

Advances in IT Early Warning, Fraunhofer Verlag, February 2013. ISBN: 978-3-8396-0474-8 [Book Website] [PDF]

Securing the Access to Electronic Health Records on Mobile Phones

2011 - Alexandra Dmitrienko, Zecir Hadzic, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy

Biomedical Engineering Systems and Technologies 2011 - Revised Selected Papers, Springer-Verlag, 2011. [PDF]

Verfolgen und Abschwächen von Malicious Remote Control Networks

2010 - Thorsten Holz

Ausgezeichnete Informatikdissertationen 2009. LNI D-10, pages 101-110, May 2010 [Dagstuhl Seminar]

Analyzing Mobile Malware

2008 - Michael Becher, Ralf Hund

Chapter 8 in "Mobile Malware Attacks and Defense", Syngress Media, October 2008
Seite: